ISM Full Note
ISM Full Note
ISM Full Note
“An information system is a set of interrelated components that works together to collect,
process, store and breakdown the information to support decision making.”
• Transaction Processing System are information system that processes data resulting from the
occurrences of business transactions
• Their objectives are to provide transaction in order to update records and generate reports i.e
to perform store keeping function
• The transaction is performed in two ways: Batching processing and online transaction
processing.
• Example: Bill system, payroll system, Stock control system.
• Management Information System is designed to take relatively raw data available through a
Transaction Processing System and convert them into a summarized and aggregated form for
the manager, usually in a report format. It reports tending to be used by middle management
and operational supervisors.
• Many different types of report are produced in MIS. Some of the reports are a summary
report, on-demand report, ad-hoc reports and an exception report.
• Example: Sales management systems, Human resource management system.
4. Experts System:
The information system plays a major role in the organization by satisfying the diverse needs
through a variety of systems such as Query systems, Analysis systems, Modelling systems and
Decision support systems.
It helps the Clerical personnel in transaction processing and answers their queries on data
pertaining to transaction. It helps junior management by providing operational data for
planning and control, and helps them in Decision-making. It helps the Middle management in
short-term planning, target setting and controlling business functions. It helps Top management
in goal setting, planning and evolving business plans and their implementation.
1. OPERATIONAL-LEVEL SYSTEMS
At the operational level are transactions processing systems through which products are
designed, marketed, produced, and delivered. These systems accumulate information in
databases that form the foundation for higher-level systems.
In today’s leading organizations, the information systems that support various functional units-
marketing, finance, production, and human resources-are integrated into what is known as an
enterprise resource planning (ERP) system. ERP systems support the entire sequence of
activities, or value chain, through which a firm may add value to its goods and services. For
example, an individual or other business may submit a custom order over the Web that
automatically initiates “just-in-time” production to the customer’s exact specifications through
an approach known as mass customization. This involves sending orders to the firm’s
warehouses and suppliers to deliver materials just in time for a custom-production run. Finally,
financial accounts are updated accordingly, and billing is initiated.
Along with helping to integrate a firm’s own value chain, transaction processing systems can
also serve to integrate an organization’s overall supply chain. This includes all of the various
firms involved in designing, marketing, producing, and delivering the goods and services-from
raw materials to final delivery. Thus, inter organizational information systems are essential to
supply-chain management. For example, purchasing an item at a Wal-Mart store generates
more than a cash register receipt; it also automatically sends a restocking order to the
appropriate supplier. Suppliers can also access a retailer’s inventory database over the Web to
schedule efficient and timely deliveries.
Many transaction processing systems support electronic commerce over the Internet. Among
these are systems for on-line shopping, banking, and securities trading. Other systems deliver
information, educational services, and entertainment on demand. Yet other systems serve to
support the search for products with desired attributes, price discovery (for example, via an
auction), and delivery of products in an electronic form (software, music, movies, or greeting
cards). A growing array of specialized services and information-based products are offered by
various organizations on the Web, as an infrastructure for electronic commerce is emerging on
a global scale.
2. KNOWLEDGE-LEVEL SYSTEMS
A large proportion of work in an information society involves manipulating abstract
information and knowledge, rather than directly processing, manufacturing, or delivering
tangible materials. Such work is called knowledge work. Three general categories of
information systems support such knowledge work: professional support systems, office
information systems, and knowledge management systems.
3. MANAGEMENT-LEVEL SYSTEMS
Information systems support all levels of management, from those in charge of short-term
schedules and budgets for small work groups to those concerned with long-term plans and
budgets for the entire organization. Management reporting systems provide routine, detailed,
and voluminous information reports specific to each manager’s areas of responsibility.
Generally, these reports focus on past and present performance, rather than projecting future
performance. To prevent information overload, reports are automatically sent only under
exceptional circumstances or at the specific request of a manager.
The primary objective of data-driven decision support systems is to analyze large pools of data,
accumulated over long periods of time in “data warehouses,” in a process known as data
mining. Data mining searches for significant patterns, such as sequences (buying a new house,
followed by a new dinner table) and clusters (large families and van sales), with which
decisions can be made. Data-driven decision support systems include a variety of statistical
models and rely on various artificial intelligence techniques, such as expert systems, neural
networks, and intelligent agents.
An important category of decision support systems enables a group of decision makers to work
together without necessarily being in the same place at the same time. These group decision
systems include software tools for brainstorming and reaching consensus. Another category,
geographic information systems, can help analyze and display data by using digitized maps. By
looking at a geographic distribution of mortgage loans, for example, one can easily establish a
pattern of discrimination.
4. STRATEGIC-LEVEL SYSTEMS
Executive information systems make a variety of critical information readily available in a
highly summarized and convenient form. Senior managers characteristically employ many
informal sources of information, however, so that formal, computerized information systems
are of limited assistance. Nevertheless, this assistance is important for the chief executive
officer, senior and executive vice presidents, and the board of directors to monitor the
performance of the company, assess the business environment, and develop strategic directions
for the future. In particular, these executives need to compare their organization’s performance
with that of its competitors and investigate general economic trends in regions or countries for
potential expansion. Often relying on multiple media, executive information systems give their
users an opportunity to “drill down” from summary data to increasingly detailed and focused
information.
The principal objective of a feasibility study is to determine whether the system is desirable on
the basis of long-term plans, strategic initiatives, and a cost-benefit analysis. System analysis
provides a detailed answer to the question, what will the new system do? The next stage,
system design, results in an extensive blueprint for how the new system will be organized.
During the programming and testing stage, the individual software modules of the system are
developed, tested, and integrated into a coherent operational system. Further levels of testing
ensure continuing quality control. Installation includes final testing of the system in the work
environment and conversion of organizational operations to the new system. The later stages of
development include such implementation activities as training users and modifying the
organizational processes in which the system will be used.
Life-cycle development is frequently faulted for its long development times and voluminous
documentation requirements-and, in some instances, for its failure to fulfill the user’s
requirements at the end of the long development road. Increasingly, life-cycle development has
been replaced by a process known as rapid application development. With RAD a preliminary
working version of an application, or prototype, is built quickly and inexpensively, albeit
imperfectly. This prototype is turned over to the users, their reactions are collected, suggested
modifications are incorporated, and successive prototype versions eventually evolve into the
complete system. Sometimes RAD and life-cycle development are combined: a prototype is
produced to determine user requirements during the initial system analysis stage, after which
life-cycle development takes over.
After an installed system is handed over to its users and operations personnel, it will almost
invariably be modified extensively over its useful life in a process known as system
maintenance. For instance, if a large system takes 2 years to develop, it will typically be used
and maintained for some 5 to 10 years or even longer. Most maintenance is to adjust the
system to the organization’s changing needs and to new equipment and system software, but
inevitably some maintenance involves correcting design errors and exterminating software
“bugs” as they are discovered
Managerial challenges of IT
Cash is king for any type of business, but it plays a particularly important role in the rapid-
growth enterprise. The assumption that a rapidly growing business has adequate cash is
misguided, since these firms must constantly reinvest in their businesses to fuel their rapid
growth. It is therefore more likely that these businesses operate while in a perpetual cash
crunch.
Planning to become bigger is the guiding principle of a rapid-growth enterprise. This approach
requires that managers remain flexible, something that in turn requires a realistic view of the
life cycle of information technology. For example, managers may wish to consider leasing
equipment to reduce the firm’s cash requirements. Evergreen clauses can be included contracts
to stipulate when the supplier will replace outdated equipment with the latest technology. This
minimizes the resources that will be needed to maintain equipment and ensures that appropriate
information technologies will always be available. Careful analysis at this point will not only
make future purchasing decisions easier but can also lead to partnerships that can produce
other benefits in the form of important supplier contacts or access to innovations.
In addition to the financial implications, senior managers should be concerned because of IT’s
potential to limit the strategic positioning of the firm or lock it into a particular business
process. Certain decisions, like the introduction of enterprise-wide applications or the
maintenance of legacy systems, have the potential to undermine the firm’s survival. Senior
managers must remain involved in decisions related to IT, since an investment in a particular
information system, even one which is not viewed as strategic, may have a high opportunity
cost that can potentially limit management’s ability to act on important strategic initiatives.
It is important to develop a framework for the technology that the organization will use. The
framework should take into account the nature of the work that individuals are expected to do
and assign appropriate technology configurations that will enable employees to meet their
business goals. This framework should also maintain technology within a particular work
group at comparable levels, thus reducing intra-departmental disparities while making inter-
departmental disparities more manageable.
It should be noted that an open environment does not imply complete or uniform information
disclosure. While employees should have access to the information needed to perform their
work, they do not have to be able to access all data within the firm. Certain synergies are
possible when information is shared throughout the organization and there are numerous
information technologies available to support this communication. However, the access that
employees have to company data is a decision that should be, but is not often, scrutinized by
senior executives. We will revisit this issue when discussing departing employees.
Choosing alliance partners highlights two major concerns in the context of information
technology. First, identifying IT requirements will often give the firm its first indication that it
needs a technology partner. Second, facilitating alliance agreements often requires
implementing integrated information systems.
Partnering with technology providers, rather than providing all technology services in-house, is
often a relatively low-risk approach for the rapid-growth enterprise. However, partnerships can
include long-term strategic alliances with technology vendors, system integrators and/or
outsourcers, as well as short-term contracts with consultants. A recurring issue for managers is
to determine how these choices will affect the organization. Taking a narrow view of IT, purely
as a source of short-term cost savings and efficiencies, tends to flaw this decision-making
process. A manager can expect that strategic alliances based on such advantages will be
equally short-lived.
If any alliance is to be successful, there must be regular communication between the partners.
The organization’s systems and information flows should be able to interface smoothly with
those of its partners. Many alliances have failed because system incompatibilities have been
over looked. Managing the flow of information requires an integrated approach. That is, the
systems in an organization must be able to communicate with the systems in the partner firms.
To ensure this, most companies will find it necessary to empower an executive such as a Chief
Information Officer to provide the leadership to implement and enforce technology policies.
Establishing this connectivity can be particularly challenging for rapid-growth firms since the
period during which separate systems are integrated can be very short.
To ensure that companies with incompatible systems are aligned, it may be necessary to select
one as an enterprise system, which is then implemented by all of the partners. This approach
has its own unique challenges, since these initiatives must often be accompanied by re-
engineering projects which enable and potentially modify the partner’s processes to meet the
information system requirements. This is a daunting task since it has always been easier to
modify technology rather than the way people work. Management must be aware that
integrating systems between partners is not simply about technology. Invariably, the task will
require some process re-engineering before the systems can be integrated successfully.
Employee recruitment is particularly difficult for rapid-growth firms, which tend to need
employees who are in high demand. IT can certainly help identify qualified people, as the
ability to match specific task requirements to individual skills from a worldwide pool of
potential employees is a key factor in the success of on-line recruiting. Unfortunately,
identifying the persons with the required skills is not enough. Prospective employees may not
be willing to move from their current locations, and there is a risk that the people recruited on-
line will not fit the organization’s culture. However, IT can be used to further screen qualified
applicants with video-conference-enabled interviews and on-line personality tests. As well, the
ability to telecommute can encourage skilled but reluctant individuals to join a company.
Virtual working arrangements and telecommuting can provide relief for shortages in job skills
while effectively reducing the company’s exposure to long-term agreements for skills that may
only be needed on a limited basis.
How can IT help protect the knowledge that departing employees may take with them and how
can it ensure that the knowledge stays within the organization after their departure?
Companies can have their employees sign non-disclosure agreements and other legal
documents. However, an effective IT-based approach to this problem is to partition and
effectively seal the knowledge that exists within the firm. With this approach, sensitive
information is compartmentalized electronically so that only those individuals that require
certain information have access to it. As pointed out earlier, an open environment does not
mean or necessitate that everyone should have access to all the information in the firm. To this
end, security measures should be in place to control who can access the information, and
access itself should be logged and monitored. Most network operating systems, like Windows
2000, have the capability to restrict access to particular information; however, restricting
access must be planned and implemented.
Providing open access to all data without considering the implications for departing employees
exposes a business to the risk that these employees will take not only the knowledge that they
played a part in creating but other data the company has collected. Designing the network
security plan is a senior management responsibility. Too often, however, in rapid-growth
enterprises, this duty falls to junior employees since they are often the only people who can
implement the plan.
The privacy of data collected on-line and the requirements for enterprise system integration are
two areas which the rapid-growth firm must be particularly aware of when dealing with
internet and e-commerce initiatives.
Internet initiatives for many rapid-growth firms provide the opportunity to collect customer
data on a large-scale basis. The rules governing the collection and use of this data by
organizations have often been set solely by company directives. But recent initiatives, like the
appointment of a Privacy Commissioner of Canada, are likely to further constrain firm
activities. For management, these new regulations will require that the organization
demonstrate due diligence when obtaining consent to use personal data on customers and
employees. This consent will be required if the data is repurposed.
E-commerce initiatives require the implementation of a significant IT infrastructure, as data
within the organization and outside it must be accessed. Management can easily be ill prepared
for the scope of work required to implement a successful e-commerce strategy. This issue
becomes more critical since it is very difficult to anticipate future system requirements when
current requirements are evolving rapidly. This issue can at least be managed if all systems
development is coordinated and islands of automation are prevented, even if the immediate
requirements do not necessitate such interconnectivity. Assigning this responsibility to a senior
level in the organization, early in the company’s life, will position the firm well for any future
e-commerce initiative.
The ability of a CEO to connect with employees in a fast-paced, rapid- growth environment is
often limited. However, the effective use of IT can bridge the gap between senior management
and employees. Although some may be cynical about technology’s ability to communicate a
vision, IT can help by increasing the frequency of contact, improving the clarity of the
message, opening multi-way communication channels, and reinforcing the vision in a timely
manner at key organizational learning points. Without the technology, senior managers often
have no way of contacting all employees directly. However, the use of corporate videos and
publications on intranets can enable employees to retrieve and capture the corporate culture on
demand. Intranets can be used to disseminate messages from the CEO and other company
executives, introduce new personnel, showcase outstanding employees, circulate company
news and success stories, support cross-functional teamwork, create important new feedback
channels, and facilitate organizational learning. Digitally documenting the corporate culture
can be extremely helpful for new employees, who have missed many of the critical events in
the company’s history.
Management must understand how IT can be used appropriately to convey a message, since the
choice of medium can be critical to communicating effectively. For example, e-mail may be
suitable for providing message reinforcement, but it may not convey an initial message as
strongly as a live presentation or video conference. An individual phone call from the CEO to
welcome a new employee is likely to be more effective than an automated voice mail.
Therefore, senior managers should understand the limitations of various communication
technologies, so that they can employ those that are appropriate.
Information technology can facilitate executive training and the development of specialized
management skills.
The first role involves designing and delivering technology-supported training in the form of
self-paced interactive CD-ROMs, videos, Web-based courses and video-conference seminars.
A training program for executives can be created based upon the future requirements of the
company, so executives get the prerequisite training just before, or as soon as, they need it.
This just-in-time approach permits them to use new skills immediately. The training program
can be adjusted as needed and aligned with the changing requirements of the organization. The
rapid growth enterprise’s stages-of-growth model can be used to guide the training program.
Regular executive training serves to reinforce the learning organization model by making
continuing education the norm at all levels of the company.
Secondly, IT can be used to link those with knowledge to those who need it. External mentors
serve this role so effectively for high-growth firms that it is not surprising to find that their use
is increasing and that the mentoring role is becoming more formalized. In fact, the business of
mentoring high-growth firms is itself a high-growth industry. However, even after an
appropriate mentor has been identified, there is still the problem of linking the mentor and the
entrepreneur. IT, in the form of e-mail, intranets, video conferencing and Web forums, can link
these parties in an efficient, cost-effective way.
Retaining key customers requires the company to either meet or exceed customer expectations.
Web-based tools and other interactive technologies can provide convenient, innovative ways to
better meet specific customers’ requirements. Similarly, customer service, a key factor in
customer satisfaction, can be improved through the use of IT. However these results must be
accomplished by focusing on the customer and not the technology. For example, companies
that have implemented automated or self-directed, customer-support Web sites have found that
they offer only partial solutions, since they do not provide the human contact often required to
solve complex problems. However, rather than abandon the technology completely, it would be
more effective to integrate IT so that a customer can easily switch from an automated, self-
directed system to a human customer-support person, when desired, via a phone or Web-
enabled videoconferencing link.
Recruiting new, profitable customers is always challenging, even when a company is able to
quantify profitability on an individual customer basis. Data mining can identify clusters of
profitable customers that can be targeted or gaps where new segments may exist. These efforts
require coordinated planning to ensure that the data needed for quick decision-making are
available and of a certain quality. IT can lower the cost of servicing customers. For example,
segments that could not be serviced profitably via traditional means may become attractive if
serviced by technology-based channels like automatic, menu-driven, self-service systems that
are telephone or web-based. Service companies in particular can benefit by providing expert
systems that use technology to deliver their basic services, and then provide links to traditional
channels whenever the expert systems cannot meet their customers’ rapidly evolving needs.
IT has long been used to collect, manipulate and disseminate information to senior managers
and thus increase the efficiency and organizational processing capacity of the firm. Software
vendors offer a wide range of applications that focus on aspects of enterprise management,
from Enterprise Resource Planning (ERP) systems to Executive Information Systems.
The ability to make timely decisions is critical to the success of a rapid-growth enterprise, and
that ability is intimately connected to the availability of information to support decision-
making. IT has often provided the link between the various parts of the company, thus
facilitating the collection and organization of the required data. However, connecting
departments electronically can result in increased interdependence and more complex decision-
making. Fortunately, the processing power provided by IT also permits managers to address
this more complex analysis.
Any company operating in a high-growth industry is likely to have at least one system that is
mission critical. The very basic data processing needs of these companies is so great that they
necessitate the use of IT, thus making these systems critical to the successful operation of the
business. An enlightening exercise for management is to try to imagine that the various
information systems have been turned off. What effect would that have on the organization?
What products or services could no longer be offered? What information would no longer be
available? The interconnectedness of these systems and their intrinsic worth to the company’s
business processes should soon become apparent. While management does not need to
understand the technical details of company systems, it is critical for senior personnel to
understand the exposure that the company faces with respect to information technology.
It is difficult to identify exactly which stage of its life cycle a high-growth company is in, since
these stages tend to overlap. However, lifecycle information can be used to help management
predict the firm’s short-term and longer-term needs and the actions that should be taken now.
Flexibility is key. Management must keep the firm’s growth requirements in mind when
considering information technology needs. Systems that are installed should be able to grow as
the firm grows. Difficult management decisions regarding the advisability of building
proprietary systems versus buying off-the-shelf solutions, or incorporating essential system
functionality versus ‘nice but not necessary’ features, must be made so that future choices are
not significantly constrained by a short-term outlook.
2. Computer Software
The programs/ application program used to control and coordinate the hardware components. It
is used for analysing and processing of the data. These programs include a set of instruction
used for processing information.
Software is further classified into 3 types:
1. System Software
2. Application Software
3. Procedures
3.Databases:
Data are the raw facts and figures that are unorganised that are and later processed to generate
information. Softwares are used for organising and serving data to the user, managing physical
storage of media and virtual resources. As the hardware can’t work without software the same
as software needs data for processing. Data are managed using Database management system.
Database software is used for efficient access for required data, and to manage knowledge
bases.
4. Network:
• Networks resources refer to the telecommunication networks like the intranet, extranet and the
internet.
• These resources facilitate the flow of information in the organisation.
• Networks consists of both the physicals devises such as networks cards, routers, hubs and
cables and software such as operating systems, web servers, data servers and application
servers.
• Telecommunications networks consist of computers, communications processors, and other
devices interconnected by communications media and controlled by software.
• Networks include communication media, and Network Support.
5. Human Resources
It is associated with the manpower required to run and manage the system. People are the end
user of the information system, end-user use information produced for their own purpose, the
main purpose of the information system is to benefit the end user. The end user can be
accountants, engineers, salespersons, customers, clerks, or managers etc. People are also
responsible to develop and operate information systems. They include systems analysts,
computer operators, programmers, and other clerical IS personnel, and managerial techniques.
Information technology plays an important role in delivering value for a business and
supporting organizational transformation. To achieve that, chief information officers have
become key members of board teams developing and delivering strategic solutions for the
business. The aim is to make an organization more competitive by aligning business strategy
with IT strategy.
Support Innovation
Organizations that want to improve their innovation capabilities and develop new products or
services for the market can use cloud computing to speed up the process. Cloud computing
enables organizations to rent additional IT resources during the development project on a
pay-as-you-go basis, rather than investing in fixed resources. Organizations can use the
additional resources to run pilot programs or speed up development. This provides an
important strategic advantage by enabling the organization to get new products to market
quickly, ahead of the competition.
Improve Responsiveness
Increase Collaboration
Collecting and analyzing data to gain greater insight into customers’ needs and preferences
provides a strategic advantage. By using powerful analytics software, organizations can
develop customized offers and personalized communications that help to increase customer
satisfaction and foster loyalty.
Organizations can use IT to make strategic changes to their business models. A company that
traditionally sold products through retail outlets might use IT to develop an e-commerce
model that enables it to reach a wider market, reduce its distribution costs and offer a more
convenient service to customers.
VALUE CHAIN
A value chain is a set of activities that an organization carries out to create value for its
customers. Porter proposed a general-purpose value chain that companies can use to examine
all of their activities, and see how they're connected. The way in which value chain activities
are performed determines costs and affects profits, so this tool can help you understand the
sources of value for your organization.
Rather than looking at departments or accounting cost types, Porter's Value Chain focuses on
systems, and how inputs are changed into the outputs purchased by consumers. Using this
viewpoint, Porter described a chain of activities common to all businesses, and he divided them
into primary and support activities, as shown below.
Primary Activities
Primary activities relate directly to the physical creation, sale, maintenance and support of a
product or service. They consist of the following:
• Inbound logistics – These are all the processes related to receiving, storing, and distributing
inputs internally. Your supplier relationships are a key factor in creating value here.
• Operations – These are the transformation activities that change inputs into outputs that are
sold to customers. Here, your operational systems create value.
• Outbound logistics – These activities deliver your product or service to your customer. These
are things like collection, storage, and distribution systems, and they may be internal or
external to your organization.
• Marketing and sales – These are the processes you use to persuade clients to purchase from
you instead of your competitors. The benefits you offer, and how well you communicate
them, are sources of value here.
• Service – These are the activities related to maintaining the value of your product or service
to your customers, once it's been purchased.
Support Activities
These activities support the primary functions above. In our diagram, the dotted lines show that
each support, or secondary, activity can play a role in each primary activity. For example,
procurement supports operations with certain activities, but it also supports marketing and sales
with other activities.
• Procurement (purchasing) – This is what the organization does to get the resources it
needs to operate. This includes finding vendors and negotiating best prices.
• Human resource management – This is how well a company recruits, hires, trains,
motivates, rewards, and retains its workers. People are a significant source of value, so
businesses can create a clear advantage with good HR practices.
• Technological development – These activities relate to managing and processing
information, as well as protecting a company's knowledge base. Minimizing information
technology costs, staying current with technological advances, and maintaining technical
excellence are sources of value creation.
• Infrastructure – These are a company's support systems, and the functions that allow it to
maintain daily operations. Accounting, legal, administrative, and general management are
examples of necessary infrastructure that businesses can use to their advantage.
Companies use these primary and support activities as "building blocks" to create a valuable
product or service.
Strategic Information System
A strategic information system is mainly developed to respond to the corporate world and
many business initiatives. Strategic information is used for gaining competitive advantage and
formulating business strategies by organizations. It may deliver a service or product that is at a
lower price, differentiated and mainly concentrates on a demanding market section, or which is
innovative. It help companies frame business strategy, competitive strategy, take management
decisions and thus gain competitive advantage and achieve cost reduction.
There are several instances of strategic planning which have helped the organizations to help
create and sustain the resources in this competitive market over the past years and has allocated
several effective benefits and simply continued to provide for the survival of these
organizations which have used these systems. These systems are often termed as ‘strategic
concepts of the organization.’ To give the maximum performance of the firms financially in a
fluctuating market, the correlation between Strategic Management and Information System is
significant fundamentally. Understanding of management information system is equally
helpful & an asset to the organisation.
In additional to the reduction in product related cost, it also helps in increasing market share,
streamline business process, provide a better business environment, diversify functional areas,
and deliver high quality product and services
- There are many strategic initiatives available to firm in addition to the 5 basic strategies of
cost leadership, differentiation, innovation, growth, and alliance.
- Building switching costs: it emphasis in strategic information systems has been to find ways
to create switching costs in the relationships between a firm and its customers or suppliers.
Enterprise resource planning (ERP) software is a form of MIS that is installed in all
departments and locations of businesses to enhance the availability of company information.
With the globalization of the economic marketplace, companies have sought ways to
improve their ability to collect and report financial information to management for effective
decision making. ERPs fill this void by allowing companies to use one computer system to
effectively record all company information.
Benefits of Networking
Another trend in MIS is the ability for companies to network with other companies for
business purposes. Manufacturing firms can shorten their supply chain using electronic data
interchange (EDI) to transfer the necessary information for ordering more products.
Networking also allows companies to transfer money through several bank accounts, creating
a quicker process for paying bills and purchasing materials. An MIS ensures that
management has all the pertinent information for these business operations, allowing them to
review the effectiveness of their operations.
An important trend in MIS is the ability for companies to use data mining tools to collect
information regarding consumer purchases and other economic trends. This allows
management to translate this information into goals and directions for future business
operations. Most MIS software also has trending or forecasting models that allow companies
to project emerging consumer markets for profitable operations. Companies can use their
internal figures in the MIS to measure the effectivess of their external data mining
techniques.
Educational Programs
As MIS software becomes more prevalent in businesses, many colleges and universities have
developed educational programs to train students on these programs. Most degrees are four-
year baccalaureate programs that combine general business courses with a mix of computer
programming and management classes. This helps students to develop a well-rounded
education in the development and implantation of MIS software. Advanced degrees are also
offered.
Computerized MIS programs have led to a new career in database management and
consulting. According to the U.S. Bureau of Labor Statistics (BLS), employment of computer
and information technology occupations is projected to grow 13 percent from 2016 to 2026,
faster than the average for all occupations
E-Business
E-business is short for “electronic business.” As an overarching term, it refers to any method
of utilizing digital information and communication technologies to support or streamline
business processes – from preparation to implementation. However, it can also refer more
specifically to the business processes of online stores or other internet-based companies.
These two slightly different interpretations of the term have led to a problem: a widely
accepted, precise definition of e-business does not yet exist. As a result, it’s interpreted
broadly, and is commonly misunderstood – mainly in relation to e-commerce. Although there
is some overlap, e-commerce refers to trading products and services online, and so is
strictly only speaking of one aspect of e-business.
The word e-business became popular following an IBM advertising campaign about
computerized procedures to automate business processes. On October 7th, 1997, the IT and
consulting firm published an eight-page essay in the Wall Street Journal and used the term to
describe how corporate systems would fundamentally change in the digital era.
At the time, IBM understood e-business as “redesigning strategic business processes and
meeting the challenges of a new market increasingly characterized by globalization, and
based on new knowledge.” Although the company wanted to present itself as an expert on this
topic, they nevertheless decided against patenting the term in the hope that other companies
would engage with the concept and help to form a new industry.
2. Online stores: the electronic sale of products and services via appropriate platforms, such
as online stores.
3. Online marketplaces: electronic commerce via digital networks, connecting the buyers and
suppliers of products and services.
E-Commerce
Ecommerce, also known as electronic commerce or internet commerce, refers to the buying
and selling of goods or services using the internet, and the transfer of money and data to
execute these transactions. Ecommerce is often used to refer to the sale of physical products
online, but it can also describe any kind of commercial transaction that is facilitated through
the internet.
Whereas e-business refers to all aspects of operating an online business, ecommerce refers
specifically to the transaction of goods and services.
Modern electronic commerce typically uses the World Wide Web for at least one part of the
transaction’s life cycle although it may also use other technologies such as e-mail. Typical
ecommerce transactions include the purchase of online books (such as Amazon) and music
purchases (music download in the form of digital distribution such as iTunes Store), and to a
less extent, customized/personalized online liquor store inventory services.
Features of E-Commerce
2. Technology Mediated: In E-commerce buyers and sellers meet in cyber space rather than
physical place. Hence E-commerce does not involve face to face contact.
3. Universality: Buying and selling take place through websites in E-Commerce. The websites
can be accessed from anywhere around the globe at any time therefore it possess the feature of
universality.
9. Customization: With the use of E-commerce technology, the world is moving from mass
production to mass-customization. Product customization ensures that goods are tailor made as
per the requirements and preferences of customers.
Advantages of E-Commerce
1. Advantages to Consumers
• Wide range of products and services :Electronic commerce through internet enables the
customers to choose a product or service of their choice from any vendor anywhere in the
world. Due to space constraint, a vendor can stock only a minimum amount of goods in the
physical store.
A virtual store enables a business organization to stock a lot of goods without considering
the inventory cost. Hence, a business also provides a lot of choice to consumers to choose a
product of his /her choice.
• Convenience: Customers can buy any product from anywhere in the world without moving
away from their workplace or home through internet. Due to bad weather, people may
restrict their shopping even if necessity arises. E-commerce provides convenience to buy
goods or services without causing any physical constraints to the consumers.
• Saves money: The cost incurred by the business on the middlemen generally falls on the
consumer. Since the middlemen are eliminated, the customer is free from bearing the cost
of the middlemen. To attract customers and to combat competitors, several business
organizations offer product and services at cheaper price. Certain goods like e-books,
music audio clips, software can be purchased and delivered through internet. It saves cost
for the buyers.
• Saves time: Time saving is one of the prime benefits of online shopping. Time taken for
selection, buying and paying for an online product may not take more than 15 minutes; the
products are delivered to customers’ door steps within a week. It saves delivery time for the
buyers.
• Adequate information: Internet is used as a main vehicle to conduct transactions in e-
business. Internet allows customers to search for product information, compare the prices
and benefits and finally evaluate its value before committing purchase. Through internet,
customers can get their queries clarified and track their delivery status when the goods are
being sent to them. If any doubts arise while handling the products, the customers can
easily contact the business through internet.
2. Advantages to Business
• Decrease in cost: The cost incurred on advertisement and communication is lower as the
business uses e-mail and online advertising channels. The cost incurred on human
resources is also low as most of the business processes are automated. Middlemen are
eliminated to a considerable extent as there is a direct link between the business and the
consumers. Due to effective supply chain, the cost incurred on maintaining inventories is
reduced.
• Effective customer service: E-commerce through internet provides up-to-date information
about the business and its products to customers. By answering customers’ queries quickly
and arranging immediate delivery of goods, a business organization is able to win the
loyalty of customers. Effective communication and quick delivery of goods lead to total
customer satisfaction.
• Increase in revenues: Decrease in cost and increase in sales help the business to enjoy
greater profits. The business being open 365 x 24 x 7 fetches revenues throughout the year.
• Transaction efficiency: Automation of business processes helps the business to streamline
its operating processes. Efficient procurement cycles reduce delivery delays. Minimum
time taken to complete transactions also results in transaction efficiency.
• Effective information management: E-Commerce helps business to create, process,
distribute, store and retrieve any information cheaply and quickly. The above benefits
enable a business organization to remove any communication gap between the business and
consumer, or between business and business associates or between business and its
employees. Communication is considered as the lifeblood of any business organization.
Good information management enables the top level management to take quick decisions
and make use of the business opportunities at the right time. E-Commerce helps at every
stage for an effective information management.
• Global reach: Business organizations are able to send messages worldwide with the help
of electronic medium explore new markets and reach globally at lower cost. E-commerce
helps to attract customers and business clients from anywhere in the world due to global
reach of the internet.
Disadvantages of E-Commerce
Technical Disadvantages
• There can be lack of system security, reliability or standards owing to poor implementation
of e-commerce.
• The software development industry is still evolving and keeps changing rapidly.
• In many countries, network bandwidth might cause an issue.
• Special types of web servers or other software might be required by the vendor, setting the e-
commerce environment apart from network servers.
Non-Technical Disadvantages
• User resistance: - Users may not trust the site being an unknown faceless seller. Such
mistrust makes it difficult to convince traditional users to switch from physical stores to
online/virtual stores.
E-Commerce models
Business to consumer is the first type of e-commerce that is also the most common one. It is
also known as B2C model. In this type online business selling is offered to individual
customers. The B2C model works by retailers and marketers that use clear data in various
marketing tools so can sell their products to the internet users.
The internet users can use the shopping cart for everything they need. Payment is mostly done
through credit cards or by payment gateways like the PayPal.
Direct interaction with the customers is the main difference with other business model. B2C
normally deal with businesses that are related to the customer. The basic concept of this model
is to sell the product online to the consumers.
Advantages
• Lower prices
• Shop 24/7
• Anyone with a basic knowledge of the internet can set up and manage a B2C e
commerce store under little supervision.
• It involves selling to a wide range of audience with already known purchase patterns
and behaviour.
• It allows for flexibility since the platform is the channel for efficiently collating market
demand in real-time.
• It is easier to encourage B2C ecommerce shoppers to practice impulse buying since you
can run ads targeted towards customers that are not even searching for what to buy.
• The retailer is in charge of discounts and giveaways as opposed to the B2B model.
• Shorter delivery times for digital products
• Sharing of information with other consumers
• Improved customer service
• Easy to scale B2C venture
Disadvantages
• Delay in receiving physical products, plus shipping
• In areas without high-speed Internet service, slow download speeds.
• Inability to touch, feel, or even smell products priorto the purchase.
• Unavailability of micropayments for purchase of small-cost products.
• High Competition
• The B2C space is highly competitive with most firms already boasting a majority of the
market share.
• Many buyers still prefer making purchases in-store rather than online.
• The market is continually evolving and requires upgrades more frequently than in other
models.
B2B Example
A cyber security firm is offering its online security software that mitigates credit card fraud to
an e commerce company.
Advantages
• Market Predictability
Compared to the other business strategies, the B2B E-Commerce business model has more
market stability. B2B sectors grow gradually and can adapt to various complex market
conditions. This helps to strengthen the online presence and business opportunities and get
more potential clients and resellers.
• Better Sales
An improved supply chain management process along with a collaborative approach increase
customer loyalty in the B2B E-Commerce business model. This, in turn, leads to improved
sales. It helps businesses to showcase product recommendations and unlock effective upselling
and cross-selling opportunities.
• Lower Costs
Due to an effective supply chain management process, this online business model leads to
lower costs for the businesses. In most cases, the work is done through automation that
eradicates chances of errors and undue expenditure.
• Data Centric Process
One of the main advantages of the model is that it relies on effective and factual data to
streamline the whole process. In this way, errors can be avoided and proper forecasts can be
made. With an integrated data-driven approach, you can calculate detailed sales statistics.
Disadvantages
• Limited Market
Compared to the B2C model, this type of business has a limited market base as it deals with
transactions between businesses. This makes it a bit of a risky venture for small and medium E-
Commerce businesses.
• Lengthy Decision
Here, the majority of the purchase decisions involve a lengthy process as there are two
businesses involved. The process may involve dependence on multiple stakeholders and
decision makers.
• Inverted Structure
Compared to the other models, consumers have more decision making power than sellers in the
B2B business model. They may demand customizations, impose specifications and try to lower
price rates.
• There is a smaller pool of customers when compared to other models.
• Where firms ask for huge discounts because of their bulk purchase, it could eat into the profit
of the seller.
C2C Examples
The foremost example of C2C via a third-party website would be an auction platform like eBay
which brings seller and buyers together. eBay charges a fee for facilitating each sale while the
other parties to the transaction are responsible for settling other matters such as product quality,
packaging, shipping, and refunds.
Examples of C2B
• Offering to do trial of products and give review.
• A sports blogger who bills a gaming company to promote their services on his blog or
signs up for Google Adsense to display ads that suit his audience in exchange for profits.
• Social media managers, content creators, brand managers, programmers, and many other
services providers working online.
Advantages
• C2B provides a channel for companies to source and hire a variety of service talents and
products from around the globe.
• It also provides an opportunity for companies to prioritize hiring from regions where the
standard of living is low, thus, reducing what figure goes on the pay check.
• It also allows service providers to gain work experience across multiple projects and get
paid well for doing so.
• Freelancers also enjoy relative freedom and flexibility in terms of working hours.
Disadvantages
• High level of communication is needed.
• Companies that hire freelancers could face a challenge in sending payment to
freelancers in some parts of the world. The possibility of outsourcing means the
freelancer paid for the job may not even be the one doing it. This situation could put the
• Employer at a disadvantage as he gets a substandard service than what he originally
paid.
5. Business-to-Government (B2G)
B2G networks or models provide a way for businesses to bid on government projects or
products that government might purchase or need for their organizations. This can encompass
public sector organizations that propose the bids. B2G activities are increasingly being
conducted via the Internet through real-time bidding.
Examples of B2G
• A government using virtual workspace software designed by a creative agency.
• The situation in Ohio where the State’s tax department hired the service of a third-party
to collect and convert tax payments in crypto currencies to fiat.
Advantages
• It features a high-profit margin and longevity than most other e commerce business
models.
• B2G businesses can enjoy tax benefits not common to other e commerce merchants.
• It increases flexibility and efficiency in public administration.
Disadvantages
• A change in government could adversely affect a B2G product or service provider
• It often requires huge capital to set up.
• It could also confine a business to operate within a specific geographical location, thus
removing the primary purpose of e commerce transactions which is borderless product
and service delivery.
Example of C2G
• When you pay electricity bill through the government website, payment of health
insurance, make payment of taxes, etc.
• An electronic voting app for citizens to participate in an election without having to visit
the polling unit or filing paperwork.
Advantages
• It makes public administration more flexible and efficient.
• It encourages public knowledge of internet-based technology.
• There is enormous profit potential for third parties contracted to handle C2G transactions.
Disadvantages
• A lack of internet service in some regions could restrict the performance of C2G e
commerce.
• Public awareness and education programmes may be needed to introduce the populace to
such systems.
Strategies for E-Commerce
4. Personalize.
Site visitors are demanding one-of-a-kind experiences that cater to their needs and interests.
Technology is available, even to smaller players, to capture individual shoppers’ interests and
preferences and generate a product selection and shopping experience led by individualized
promotions tailored to them.
Eg.: Amazon is the pioneer of the user-centric shopping experience through
personalization. Their homepage helps people easily find the right product in the personalized
block in the first section when you log in under the “related to items you’ve viewed” tag.
6. Content Marketing
Proper content marketing can attract more positive attention, interaction, and sustainable
conversions in a way no other marketing method can. By creating and promoting original
content, you are ensuring that your audience is receiving new information that matters to them
on a continual basis.
9. Artificial Intelligence
E-commerce is another highly appropriate domain where AI can make a significant impact.
They enable you to gather as well as investigate data in real-time and track the way potential
customers interact with your brand. AI facilitates better efficiency and competence
10. Chatbots
Technically a part of AI, chatbots can be an important weapon for e-commerce companies
when it comes to enhancing customer experience. You can use chatbots to instantly
communicate with customers and resolve their issues on multiple platforms, such as Facebook
or your online store.
A chatbot is basically a computer program that simulates a conversation with a human user
with intent to furnish some kind of service. Some chatbots are so advanced; it is really hard to
distinguish them from chatting with a real human.
Impact of IT on Business
The rise of information technology has paved the way for various innovations. With the
digitization of information, more and more businesses are increasingly leveraging the benefits
of digital tools to improve their prospects. Information technology has been crucial in turning
this process into a complete success.
1. Cloud Computing
The concept of cloud computing is immensely popular among businesses owing to the
efficiency in business operations that it provides. Cloud computing utilizes information
technology to capitalize on its ability to provide improved agility and time and resource
management for businesses. Increasingly, businesses are shifting to the cloud to leverage its
many benefits. It has been predicted that more than $1 trillion will be impacted in IT
spending by the transition of businesses to cloud computing by 2020.
“Cloud-first strategies are the foundation for staying relevant in a fast-paced world,” Ed
Anderson, research VP at the analyst firm, Gartner pointed out, “The market for cloud services
has grown to such an extent that it is now a notable percentage of total IT spending, helping to
create a new generation of start-ups and “born in the cloud” providers.”A good Internet
connection and a commendable WiFi connectivity are important to accomplish this.
Information technology helps in developing automated processes for businesses. This not only
helps in reducing the cost of operation but also saves time. The time saved can be utilized to
focus on other tasks, thus speeding up business processes significantly.
Processes like billing, tracking metrics, collecting customer data, monitoring certain processes
etc. can be automated easily. There are numerous automation software that can be utilized for
this purpose.
3. Working Remotely
Implementation of information technology provides the ability to remotely access your
company’s network. As a result, it equips employees with the ability to get the work done even
if they are not physically present at the workplace.
Such agility has a number of benefits. Therefore, it has gained massive popularity. In fact,
according to a U.S. federal government resource, 47% of the employees are eligible to work
remotely.
Ian Adams, head of strategic marketing development at the outsourcing company, Mitie
pointed out, “We’re seeing greater collaboration between HR, IT, property and facilities
management and job titles like ‘workplace director’ making this agile workplace happen.”
4. Mobile Technology
Mobile technology has picked up momentum owing to its convenience, efficiency and speed.
With the rise in the popularity of information technology, implementation of mobile
technology has gained ground quickly.
The trend of BYOD (Bring Your Own Device) is on the rise owing to increased employee
satisfaction. As many as 74% of the organizations are already utilizing this trend or plan on
doing so in the future. In fact, the BYOD market is estimated to reach $181.39 billion by 2017.
Mobile technology takes business communication to a whole new level. A mobile team can
improve the workplace productivity considerably. There are numerous ways to integrate
mobile technology in the workplace. In fact, chances are, your employees are already using it.
5. Protecting Information
Every organization has a mammoth database comprising various information related to
business transactions, client details and so on. Such information is extremely valuable to a
business and can cause a host of legal issues if it is lost. This is where information technology
becomes relevant. It provides the right resources to store the information in a way that ensures
maximum protection.
Virtual storage systems can keep information safe by allowing a limited number of users to
access these. Increased protection also ensures that these systems are not hacked and the
information is not wiped out owing to some problems. Therefore, information technology helps
in upholding business integrity.
Information technology provides the best tools for communicating with customers and solving
their problems in real time. It has unlocked the facilities like Email, social media and other
messaging platforms for this purpose.
A happy customer-base is important for the growth of a business. Various cloud-based
communication channels have made customer experience more improved.
7. Management of Resources
A business has a variety of resources. These may include financial resources, human resources
and so on. For large organizations, managing resources becomes quite difficult. Information
technology plays a vital role in managing these resources effortlessly by introducing a wide
range of feasible solutions.
For example, the integration of Enterprise Resource Planning (ERP) has improved the
efficiency of various business processes. ERP is a business management software that enables
an organization to use a series of integrated applications that can manage and automate various
business operations. Information technology is at the core of such software. The
implementation of ERP is progressing at a rapid rate with more and more businesses
implementing this efficient technology to make certain business processes hassle-free.
Almost every software that businesses use has open source variants that are widely available
on the Internet. Utilizing these could mean multiple benefits at reduced expenses.
Data Vs information
Data is a collection of facts. Information is how you understand those facts in context.
Data is unorganized while information is organized.
Data is not typically useful on its own but information as typically useful on its own
Data generally includes the raw forms of numbers, statements and characters while
information does not have to.
Information depends on data.
Data Management
Data management is an administrative process that includes acquiring, validating, storing,
protecting, processing, required data. In the context of organization, Data management is the
process of ingesting, storing, organizing, and maintaining the data, created and collected by
the organization. The data management helps ensure that data is accurate, available and
accessible.
Database
A database is an organised collection of data, stored and accessed electronically from a computer
system. It is a repository of information needed for running functions in an organization. The DB
would permit input, modification, retrieval data and make it possible to search for information to
plan, implement and control operations. They are used in transaction processing systems and data
warehouses.
Database Model
• A Database model defines the logical design and structure of a database.
• It defines how data will be stored, accessed and updated in a database management system.
Database models:
• Hierarchical Model
• Network Model
• Entity-relationship Model
• Relational Model
Hierarchical Model
This database model organizes data into a tree-like-structure, with a single root, to which all
the other data is linked. The hierarchy starts from the root data, and expands like a tree,
adding child nodes to the parent nodes (like a family tree).
In this model, a child node will only have a single parent node.
This model can efficiently describe many real-world relationships like index of a book,
college databases, etc.
In hierarchical model, data is organized into tree-like structure with one-to-many
relationship between two different types of data, for example, one department can have
many courses, many professors and of-course many students.
Network Model
This is an extension of the Hierarchical model. In this model data is organized more like a
graph, and are allowed to have more than one parent node.
In this database model data is more related as more relationships are established in this
database model. Also, as the data is more related, hence accessing the data is also easier
and fast. This database model was used to map many-to-many data relationships.
This was the most widely used database model, before Relational Model was introduced.
Entity-relationship Model
In this database model, relationships are created by dividing object of interest into entity and its
characteristics into attributes.
E-R Models are defined to represent the relationships into pictorial form to make it easier for
different stakeholders to understand.
This model is good to design a database, which can then be turned into tables in relational model
(explained below).
Relational Model
In this model, data is organized in two-dimensional tables and the relationship is maintained
by storing a common field.
This model was introduced by E.F Codd in 1970, and since then it has been the most widely
used database model, in fact, we can say the only database model used around the world.
Data Warehousing
A Data Warehousing (DW) is process for collecting and managing data from varied sources to
provide meaningful business insights. A Data warehouse is typically used to connect and
analyze business data from heterogeneous sources. The data warehouse is the core of the
business intelligence (BI) system which is built for data analysis and reporting.
It is a blend of technologies and components which aids the strategic use of data. It is
electronic storage of a large amount of information by a business which is designed for query
and analysis instead of transaction processing. It is a process of transforming data into
information and making it available to users in a timely manner to make a difference.
The Data Warehouse is maintained separately from the organization's operational database
and it provides a new design which can help to reduce the response time and helps to enhance
the performance of queries for reports and analytics.
Data warehouse system is also known as Decision Support System (DSS), Executive
Information System, Management Information System, Business Intelligence Solution,
Analytic Application, Data Warehouse.
The need to warehouse data evolved as computer systems became more complex and
needed to handle increasing amounts of Information. Though the idea of DW existed, the real
concept was given by Inmon Bill, who is considered as a father of data warehouse.
Data Mining
Data mining is the process of sorting through large data sets to create models and to
identify patterns and establish relationships that provide insights that are revealing,
significant, and valuable to solving problems through data analysis.
Data mining is not restricted to solving business problems. In has varied uses, for example,
data mining can be used in the life sciences to discover gene and protein targets and to
identify leads for new drugs.
To Do: Find out the differences between Datawarehouse and Data Mining.
Examples for use of data mining:
• Predict those customers likely to change service providers.
• Discover the factors involved with a disease.
• Identify fraudulent behavior.
Data mining uses sophisticated mathematical algorithms, machine learning, statistics, and
database systems to segment the data and evaluate the probability of future events and to
predict future trends.
Eg.: Oracle Data Mining performs data mining in the Oracle Database. Oracle Data Mining
does not require data movement between the database and an external mining server,
thereby eliminating redundancy, improving efficient data storage and processing, ensuring
that up-to-date data is used, and maintaining data security.
To Do: Find out names of other data mining softwares available in the market
Data preprocessing
Data preprocessing describes any type of processing performed on raw data to prepare it for
another processing procedure. Commonly used as a preliminary data mining practice, data
preprocessing transforms the data into a format that will be more easily and effectively
processed for the purpose of the user. There are a number of different tools and methods
used for preprocessing, including: sampling, which selects a representative subset from a
large population of data; transformation, which manipulates raw data to produce a single
input; denoising, which removes noise from data; normalization, which organizes data for
more efficient access; and feature extraction, which pulls out specified data that is significant
in some particular context.
• Understand business objectives and find out the needs of the business.
• Next, assess the current situation by finding the resources, assumptions, constraints
and other important factors which should be considered.
• Then, from the business objectives and current situations, create data mining goals to
achieve the business objectives within the current situation.
• Finally, a good data mining plan has to be established to achieve both business and
data mining goals. The plan should be as detailed as possible.
2. Data understanding
•The data understanding phase starts with initial data collection, which is collected from
available data sources, to help get familiar with the data. Some important activities must be
performed including data load and data integration in order to make the data collection
successfully.
*Data Load is the process that involves taking the transformed data and loading it where the
users can access it.
*Data integration is the process of combining data from different sources into a single, unified
view.
•Then, the data needs to be explored by tackling the data mining questions, which can be
addressed using querying, reporting, and visualization.
•Finally, the data quality must be examined by answering some important questions such as
“Is the acquired data complete?”, “Is there any missing values in the acquired data?”
. Data preparation
The data preparation typically consumes about 90% of the time of the project. The outcome
of the data preparation phase is the final data set. Once available data sources are identified,
they need to be selected, cleaned, constructed and formatted into the desired form. The data
exploration task at a greater depth may be carried during this phase to notice the patterns
based on business understanding.
4. Modeling
•First, modeling techniques have to be selected to be used for the prepared data set.
•Next, the test scenario must be generated to validate the quality and validity of the model.
•Then, one or more models are created on the prepared data set.
•Finally, models need to be assessed carefully involving stakeholders to make sure that
created models meet business initiatives.
5. Evaluation
In the evaluation phase, the model results must be evaluated in the context of business
objectives in the first phase. In this phase, new business requirements may be raised due to
the new patterns that have been discovered in the model results or from other factors.
Gaining business understanding is an iterative process in data mining. The go or no-go
decision must be made in this step to move to the deployment phase.
6. Deployment
The knowledge or information, which is gained through data mining process, needs to be
presented in such a way that stakeholders can use it when they want it. Based on the business
requirements, the deployment phase could be as simple as creating a report or as complex as
a repeatable data mining process across the organization. In the deployment phase, the plans
for deployment, maintenance, and monitoring have to be created for implementation and
also future supports. From the project point of view, the final report of the project needs to
summary the project experiences and review the project to see what need to improved
created learned lessons.
The above 6 steps describe the Cross-industry standard process for data mining (CRISP-DM).
It is an open standard process model that describes common approaches used by data mining
experts. It is the most widely-used analytics model.
Few Key Data Terminologies:
1.data cleaning (to remove noise or irrelevant data),
2.data integration (where multiple data sources may be combined)
3.data selection (where data relevant to the analysis task are retrieved from the database),
4.data transformation (where data are transformed or consolidated into forms appropriate
for mining by performing summary or aggregation operations, for instance)
5. data mining (an essential process where intelligent methods are applied in order to extract
data patterns),
6.pattern evaluation (to identify the truly interesting patterns representing knowledge based
on some interestingness measures and
7.knowledge presentation (where visualization and knowledge representation techniques are
used to present the mined knowledge to the user).
Roles of MIS
MIS satisfies the diverse needs through a variety of needs. It helps in strategic planning management
control, operational control, and transactions processing. It helps in clerical transactions processing.
MIS helps in Junior Management to help in decision making at a operational level by providing
operational data. MIS helps in middle management in short-term planning, target setting and
controlling the business functions. MIS for Top-level management for goal setting strategic planning
and evolving the business plans.
Types of Communication
There are three types of communication: -
3) Based on expression
• Oral communication:- Communication which is made orally.
• Written communication :- Communication which is in the written format.
With customers
Communication technology gives increased access to information for clients. The
sophistication of the client , forces organizations to innovate faster involves decision making
at various levels. The information captured can help managers in the process of
understanding the behavior of consumers and the solutions available in the market.
Competitor analysis
ICT helps decision makers to understand the competitors strategies. Various vehicles of
communication can be explored To identify existing and new competitors in diverse
geographical areas. New products and services can quickly be identified and examined by
analyzing competitor strategies. Decision making related to product development
considering features, prices, and delivery options offered by competitors.
Direct competitor: Businesses that are selling the same type of product or service as you.
E.g.: McDonalds is a direct competitor with Burger King.
Indirect competitor: Businesses that still compete even though they sell a different service or
product. The products or services offered by indirect competitors tend to be those that can be
substituted for one another.
IT Strategy
An IT strategy is a detailed set of documentation that encompasses the company's vision
and strategic planning for Information Technology. This would include budgeting, strategy
documents, and operating models for the future state of the company's technology architecture. IT
strategy helps to unify the organization, increase efficiency, get accurate insights. The strategic
planning process should include representatives from every department under the guidance of the
Chief Information Officer (CIO) or outsourced to a virtual CIO. A virtual CIO (vCIO) is a
dedicated resource who serves as a Chief Information Officer on a flexible basis. Their primary
role is to formulate strategic IT goals for your company, and then manage an IT strategy and budget
that meets those goals.
Implementation of IT Strategy:
The framework should be designed considering the following:
1. Threat of new entrants: For most firms, the Internet increases the threat of new
competitors. First, the Internet sharply reduces traditional barriers to entry, such as the need
for a sales force or a physical storefront to sell goods and services. All a competitor needs
to do is set up a Web site. This threat is especially acute in industries that perform an
intermediation role as well as industries in which the primary product or service is digital.
Second, the geographical reach of the Internet enables distant competitors to bring
competition into the local market, or even an indirect competitor to compete more directly
with an existing firm.
2. Bargaining power of suppliers: The Internet’s impact on suppliers is mixed. On the one
hand, buyers can find alternative suppliers and compare prices more easily, reducing the
supplier’s bargaining power. On the other hand, as companies use the Internet to integrate
their supply chain and join digital exchanges, participating suppliers will prosper by
locking in customers and increasing switching costs.
3. Bargaining power of customers (buyers): The Web greatly increases a buyer’s access to
information about products and suppliers, Internet technologies can reduce customer
switching costs, and buyers can more easily buy from downstream suppliers. These factors
mean that the Internet greatly increases customers’ bargaining power.
4. Threat of substitute products or services: Information-based industries are in the greatest
danger here. Any industry in which digitalized information can replace material goods
(e.g., music, books, software) must view the Internet as a threat.
5. Rivalry among existing firms in the industry: The visibility of Internet applications on
the Web makes proprietary systems more difficult to keep secret, reducing differences
among competitors. In most industries, the tendency for the Internet to lower variable costs
relative to fixed costs encourages price discounting at the same time that competition
migrates to price. Both are forces that encourage destructive price competition in an
industry.
What is a CIO?
The CIO or Chief Information Officer emerged as a job title in the 1980’s. This
highly technical person would oversee the information technology department’s resources and
staff.
The role of the Chief Information Officer (CIO) is one that has seen continuous
change over the years, yet we are only just beginning. Next up is the digital revolution, already a
train which we all have to jump onto. It is providing our companies with an opportunity to add
amazing new capability, and new business opportunities in ways we never planned or could have
predicted.
The digital revolution has already changed how we use technology,
and how we think about business models. However today we have many new challenges that have
to be managed. These changes are only accelerating, and businesses already assume the CIO will
be a leader in this change and not just someone who keeps up.
As digital transformation efforts progress, alongside organizational changes like the
ones Adobe’s Stoddard describes the CIO role continues to evolve. Successful CIOs have become
business leaders of digital business units or have empowered IT organizations to create the digital
backbone to accelerate the move to hybrid cloud environments and new operating models. The
chief information officer of an organization is responsible for several business functions. First and
most importantly, the CIO must fulfill the role of a business leader. The CIO makes executive
decisions regarding matters such as the purchase of IT equipment from suppliers or the creation of
new IT systems. Also as a business leader, the CIO is responsible for leading and directing the
workforce of their specific organization. A CIO is typically "required to have strong organizational
skills."This is particularly relevant for the chief information officer of an organization who must
balance roles and responsibilities in order to gain a competitive advantage, whilst keeping the best
interests of the organization’s employees in mind. CIOs also have the responsibility of recruiting,
so it is important that they work proactively to source and nurture the best employees possible.
Value Chain
✓ A value chain is a step-by-step business model for transforming a product or service from
idea to reality.
✓ Value chains help increase a business's efficiency so the business can deliver the most value
for the least possible cost.
✓ The end goal of a value chain is to create a competitive advantage for a company by
increasing productivity while keeping costs reasonable.
✓ The value-chain theory analyzes a firm's five primary activities and four support activities.
✓ A company conducts a value-chain analysis by evaluating the detailed procedures
involved in each step of its business. The purpose of a value-chain analysis is to increase
production efficiency so that a company can deliver maximum value for the least possible
cost.
In his concept of a value chain, Porter splits a business's activities into two
categories, "primary" and "support".
1. Primary activities:
It consists of five components, and all are essential for adding value and creating
competitive advantage:
2. Support Activities:
The role of support activities is to help make the primary activities more efficient.
When you increase the efficiency of any of the four support activities, it benefits at least
one of the five primary activities. These support activities are generally denoted as
overhead costs on a company's income statement:
Starbucks Corporation: Starbucks (SBUX) offers one of the most popular examples of a
company that understands and successfully implements the value-chain concept. There are
numerous articles about how Starbucks incorporates the value chain into its business model.
1) Strategic planning: In this planning stage, objectives, goals and strategies are compared
with the objectives, goals and strategies of the organization. The MIS mission, MIS
policies & strategies are set.
2) Information Requirements Analysis: This stage deals with the current and future needs
for IS to support decision-making and operations of the organization. Then the master
development plan is assembled.
3) Resource Allocation: After identification of the need for information system applications
for entire organization, the relevant resources are allocated. This includes hardware,
software, data communication systems, personnel, finance, etc.
✓ Return on investment
✓ Charge out
✓ Portfolio approach
✓ Steering committees.
4) Project Planning: The last stage, project planning, provides an overall framework for
system development planning, scheduling and controlling. This involves evaluating the
project in terms of requirement and difficulty. Time, cost and completion estimates have
to be finalized. Tools like Milestones, critical path method (CPM) and Gantt Charts can be
utilized.
Technology Updates
• Successful businesses establish technology strategies that help them gain a
competitive advantage through cost savings, process improvements, faster time to
market, and improved quality and service levels. Companies without a defined strategy
make poor buying decisions, adopt ineffective tools, and often experience a high level of
frustration. Technology updates can be done fully fledged or by upgrading piece by
piece. Technology updates are expensive, but the benefits generally outweigh the cost.
o Improve security
o Increase productivity
o Reduced errors
o Improved communications
o Old devices become obsolete
o New software incompatible with old devices
o IT/Vendor support (professionals & vendors can’t support old tech)
o Reduced costs (old and unstable tech can cost a lot), reduced operation costs
o Employee efficiency / employee health & well being
o Customer satisfaction
o Gain competitive advantage / reduce competitive disadvantage
o Business growth
Business Processes
A business process is a collection of linked tasks which find their end in the
delivery of a service or product to a client. A business process is defined as a set of activities
and tasks that, once completed, will accomplish an organizational goal. The process must
involve inputs, value addition and outputs. Processes can be simple or complex, short or long
running - based on number of steps, number of systems involved, dependencies and need for
documentation.
Process
Core business processes:
o Product Development
As an organization grows bigger it will add more sub-processes or perhaps additional core process
like supplier management, strategy, or legal & compliance.
o Supporting processes such as human resources and accounting are put in place to
support the core business processes.
✓ BPI allows for automation of business processes, integration of systems and services, and
the secure sharing of data across numerous applications.
Steps of BPI
o Design, Implementation, and Management: BPI helps eliminate the need to duplicate
data in different systems and increase the comprehensive efficiency of the business’s
operation, save time and money.
Business Process Reengineering (BPR)
✓ The processing (transformations which usually go through several stages and may
turn out to be time and money consuming).
Define Objectives
2. Identify customer needs: Redesigning should result in added value to the customer. All
parameters of customer needs have to be considered – customer expectation, requirement,
buying habits, spending habits, etc.
3. Study existing processes: Existing processes are the base for the new processes. Analysing
them helps to identify strengths that can be retained and weaknesses that need to be
overcome.
4. Formulate redesign plan: All planned changes / possible alternatives are considered and
the best one selected for implementation.
✓ Integrate information processing work into the real work that produces the
information.
✓ Link parallel activities in the workflow instead of just integrating their results.
✓ Put the decision point where the work is performed, and build control into the
process.
Example 1: Hallmark used to spend 3 years in bringing new products to the market. Using
reengineering, the goal was set to change cycle time to one year. In 1991, a new line of cards was
brought to market in 8 months, ahead of schedule, by creating a cross functional team for product
development.
Example 2: Big basket uses BPR to deliver products and increase productivity during the
lockdown, despite reduced work force.
✓ Both these approaches aim for process improvement, but differ in focus.
✓ Continuous process improvement seeks incremental improvements that are not drastic.
✓ BPI looks into ways to improve the processes in the existing structure whereas BPR strives
for dramatic improvements where the organization breaks away from conventional ways.
Enterprise Wide System
✓ The key purpose of an IOS is to streamline the flow of information from one company’s
operations to another’s.
E.g.: Application Server - company builds an e-business application in which users interface with
the application only through a web browser. The application server is responsible for returning
HTML content (information) to users based on their requests. This server also collects information
entered by users in their web browsers. The exchange of information between client and server
and server and client always occurs through a web server.
E-Governance
Interactions in e-governance
o G2G
– G2G Vertical: national to state to local authorities and vice versa
– G2G horizontal: with other governments
o G2C
o G2B
o G2E
Purpose
The basic purpose of e-governance is to simplify processes for all, i.e. government,
citizens, businesses, etc. at National, State and local levels. In short, it is the use of electronic
means, to promote good governance.
Benefits of E-Governance
✓ Reduced corruption
✓ High transparency
✓ Increased convenience
-----------------------------------------------------
-
MODULE 4-ENTERPRISE SYSTEMS
The concept of Supply Chain Management (SCM) is based on two core ideas:
The first is that practically every product that reaches an end user represents
the cumulative effort of multiple organizations. These organizations are
referred to collectively as the supply chain.
The second idea is that while supply chains have existed for a long time,
most organizations have only paid attention to what was happening within
their “four walls.” Few businesses understood, much less managed, the
entire chain of activities that ultimately delivered products to the final
customer. The result was disjointed and often ineffective supply chains. So
SCM brings it all together efficiently.
SCM consists of −
operations management
logistics
procurement
information technology
Objectives of SCM
Features of SCM
Scope of SCM
SCM Processes
Supply Chain Management process
The building blocks of SCM are as seen in the above diagram. Let us see a little
more in detail:
Strategic Planning
o Strategic Supply Chain Design Process
o Strategic Sourcing Process
Demand Planning
o Forecasting
o Life Cycle Planning
o Promotion Planning
Supply Planning
o Safety stock planning
o Supply Network planning
o Outsourcing
o Distribution
o Customer collaboration
o Supplier collaboration
Procurement
o Purchase order processing
o Receipt confirmation processing
o Invoice verification process
Manufacturing
o Production planning/scheduling
o Manufacturing execution
Warehousing
o Inbound processing
o Outbound processing
o Cross docking
o Warehousing and storage
o Physical inventory
Order Fulfillment
o Sales order processing
o Billing
Transportation
o Transportation planning
o Transportation execution
o Freight costing
Advantages of SCM
To the suppliers −
o Help in giving clear-cut instruction
o Online data transfer reduce paper work
Inventory Economy −
Distribution Point −
o Satisfied distributor and whole seller ensure that the right products
reach the right place at right time
Channel Management −
Financial management −
o Low cost
o Realistic analysis
Operational performance −
External customer −
A well managed Supply chain helps to have an advantage over competitors as well
as maximize the value that is provided to the customers. However with a lot of
activities to be coordinated in perfect timing, there are numerous challenges that
have to be overcome for efficient SCM.
APPLICATION OF SCM
Industry 4.0 and SCM
In Industry 4.0, the way enterprises apply technology to the supply chain is
fundamentally different from how they applied it in the past. For example, within
the maintenance function, enterprises would typically wait until a machine
malfunctioned to fix it. Smart technology has changed that. We can now predict
failure before it happens, and then take steps to prevent it so that the supply chain
can continue uninterrupted. Today’s SCM is about using technology to make the
supply chain―and the enterprise―smarter.
Industry 4.0 SCM also provides a significant advantage over traditional SCM
because it enables aligned planning and execution while at the same time
delivering substantial cost savings. For instance, companies that operate under a
“plan-to-produce” model—in which product production is linked as closely as
possible to customer demand—must create an accurate forecast. That involves
juggling numerous inputs to ensure that what is produced will meet market demand
without exceeding it, avoiding costly overstocks. Intelligent SCM solutions can
help you meet customer demand and financial objectives at the same time.
Intelligent SCM has other advantages, too. For instance, it can free up supply chain
employees to contribute to the business in ways that add more value. Better SCM
systems that automate mundane tasks can equip supply chain professionals with
the tools they need to successfully deliver the products and services the supply
chain is designed around.
SCM has historically been about increasing efficiency and reducing costs.
Although those needs haven’t changed, what has changed is that the customer is
now playing a front-and-center role in setting SCM priorities. It’s been said that
“customer experiences live and die in the supply chain.”
The supply chain of the future is all about responsiveness and the customer
experience― understood and managed within a network rather than a linear model.
Every node of the network must be attuned and flexible to the needs of the
consumer while also being capable of addressing factors such as sourcing, trade
policies, modes of shipment, and more.
In the past, supply chain planning has been a periodic business exercise. Heading
into the future, it will be continuous. Future SCM systems will also bring tighter
alignment between planning and execution, which is not a current state for most
enterprises. The need for speed and accuracy in SCM is only going to increase.
Make sure your supply chain is ready for the future by supporting it with an
intelligent SCM system.
WHAT IS A CRM?
CRM DEFINITION
A CRM tool helps to store customer and prospect contact information, identify
sales opportunities, record service issues, and manage marketing campaigns, all in
one central location — and make information about every customer interaction
available to anyone in the organization, who might need it. It uses data
analysis about customers' history with a company to improve business
relationships with customers, specifically focusing on customer retention and
ultimately driving sales growth.
A CRM system gives everyone (eg.: from sales, customer service, business
development, recruiting, marketing, etc) — visibility and easy access to data,
making it easier to collaborate, forecast, follow leads, create and maintain
customers, etc that ultimately lead to increased productivity.
A CRM platform can integrate with business tools, such as document signing,
accounting and billing, and surveys, so that information flows both ways to give a
true 360-degree view of the customer. Latest versions of CRM have built-in
intelligence that automates administrative tasks, like data entry and lead or service
case routing, so that saved time is allotted for more valuable activities.
Automatically generated insights help to understand the customers better, even
predicting how they will feel and act so that the team can prepare the right
outreach.
1. Make improvements to the bottom line - It can produce real results with
regard to lead conversion, driving sales, customer satisfaction, faster
decision making, revenues, etc
2. Identify and categorize leads - by focusing on the right leads, sales can
prioritize the opportunities that will close deals, and marketing can identify
leads that need more nurturing and prime them to become quality leads.
3. Increase referrals from existing customers – better understanding and
relationship with existing customers converts them to repeat customers and
helps to win new business/customers from them.
4. Offer better customer support - Today's customers are demanding and
expect fast, personalized support 24/7 even across time zones. Through
CRM system, the agents can quickly refer details like customer order,
delivery issues, etc so they can give customers the answers they need, fast.
5. Improve products and services - CRM systems gather information from a
huge variety of sources and give unprecedented insights into the
customer/customer behavior which helps to spot problems early, identify
gaps and improve offers.
Cloud-based CRM
A significant development in CRM systems has been the move into the cloud from
on-premises CRM software. Freed from the need to install software on hundreds or
thousands of desktop computers and mobile devices, organizations worldwide are
discovering the benefits of moving data, software, and services into a secure online
environment.
Faster deployment
Automatic software updates
Cost-effectiveness and scalability - doesn’t need special installation, no
hardware to set up, no version control and update schedules. It is flexible
and can be scaled as the business grows. Payment need to be made only for
features that are accessed.
The ability to work from anywhere, on any device – eg.: helps sales force on
the move.
Increased collaboration
Despite all the advantages, there are challenges, especially with regard to the
implementation of CRM:
Executive Support: A CRM system will only be effective if people in the
Organization use it diligently. The senior management should always be
involved to provide positive support.
Technology Choices: The right technology is very important for any CRM
Implementation. Technological hurdles can be a huge challenge.
Setting guidelines and CRM strategy: The internal usage guidelines and
the CRM philosophy have to be laid down. People can be the main factor for
both the success and failure of a CRM Implementation.
The best part about a CRM system is that almost any organizational unit can
benefit from it — from sales and customer service to recruiting, marketing, and
business development. Good CRM software gives a better way to manage external
relationships.
Storing all customer information in one place, recording service issues, identifying
sales opportunities, managing marketing campaigns — these are just a few
capabilities that CRM features.
Since CRM provides easy access to data, it also becomes much easier for users to
collaborate on different processes and increase productivity. Another strong
argument in favor of CRM is that it is suitable for businesses of any size.
ERP software typically consists of multiple enterprise software modules that are
individually purchased, based on what best meets the specific needs and technical
capabilities of the organization. Each ERP module is focused on one area of
business processes, such as product development or marketing. (eg.: SAP Sales
and Distribution, SAP Product Planning, SAP quality management, SAP human
capital management, etc)
A business can use a combination of different modules to manage back-office
activities and tasks like:
Distribution process management
Supply chain management
Services knowledge base
Configure prices
Improve accuracy of financial data
Facilitate better project planning
Automate the employee life-cycle
Standardize critical business procedures
Reduce redundant tasks
Assess business needs
Accounting and financial applications
Lower purchasing costs
Manage human resources and payroll
The 6 main ERP components are:
The first step is to have a thorough understanding of the needs and challenges of
the business and then give this to a selection of ERP providers for a response. The
ERP provider chosen should have experience within your industry, take the time to
understand the business and be able to help you meet your business goals.
Otherwise, you could end up making a very costly mistake. It is important to
ensure you gather enough information about your overall requirements and have
open conversations with potential providers, so you can find the right software to
meet your business needs and the right partner to support you in your ERP
journey.
It is imperative that those who lead from the top are fully committed to the ERP
implementation. Actively communicate with key personnel and ensure they
understand the need for them to be fully involved. Also involving them in the
decision-making process will increase the likelihood of commitment. The better
the communication, the more likely you will have complete buy-in from not only
your managers but also the rest of the team.
3. System training
The ERP system will only ever be as good as those who are using it, so one of
the main challenges your business will face is to ensure adequate training is
provided. The successful implementation of your ERP system will be much more
feasible if you offer your employees full training and ensure they are motivated to
use the system.
Even if the ERP system meets all of the business requirements and expectations
one of the potential downfalls could be the lack of testing. It is imperative that
a sufficient amount of testing is carried out in the ERP implementation to ensure
it will perform when deployed. Testing will provide the opportunity to highlight
any issues, so they are taken care of before the system is fully implemented and
live.
5. Lack of budgeting
In the long run, ERP systems can help businesses increase efficiency and
productivity, but implemented badly could have the opposite effect, which is
something that is not always taken into account. When budgeting you must take
into account the financial costs and ERP project team members’ time. It is essential
for someone within the company to take charge of the project, communicate and
work closely with the ERP provider in order to achieve the best results.
What Are the Advantages of Implementing ERP?
Once enterprises see the weaknesses and the redundancies in their software
strategy, they can plot a course to set things right. The best aspect of this reality
check is that it affords enterprises the opportunity to better link IT and business
units. Some enterprises will go so far as to embed full-time IT workers within the
business units so that they better understand how that unit functions and where the
inefficiencies are.
2. Lower IT costs: To be clear, these don't come immediately. A new ERP system
is a major investment and its implementation is always time consuming. However,
one unified ERP system is less costly than disparate systems for human resources,
financial management, and supply chain management. Ultimately, you may save
on software licenses, training, and support. But your mileage may vary.
3. End-to-end visibility: One of the sexiest features of ERP is that it allows high-
level decision makers real-time snapshots of business operations. This includes an
integrated view of areas such as inventory, shipping, supply chain management,
manufacturing, sales and financials. All this data provides actionable business
intelligence. If daily inventory levels are showing a pattern, then the supply chain
can be adjusted so the right levels of the right products are in the right place and at
the right time. The availability of this data on a single dashboard can also
encourage collaborative efforts and it gives great insight to workflow efficiencies
and employee productivity.
5. Data security: Data security can be a blessing or a curse. While having a central
repository for your data can be nerve-wracking, ERP systems and service providers
that host them often have better data security in place than enterprises that host
their own on-premise ERP systems.
International Information Systems
When building an international system, one must first understand the global
environment in which your firm is operating, including the business drivers that
are pushing your industry toward global competition and management challenges.
The structure of the organization, locations, job functions, management issues,
technology platforms will all factor in to a successful globalization plan.
The global business drivers can be divided into two groups: general cultural factors
and specific business factors.
General cultural factors include:
Political stability
Global markets
Global coordination
Global workforce
Speed: Different data transfer speeds, many slower than the U.S
Most companies have inherited patchwork international systems from the distant
past with little online control and communication. Corporations in this situation
increasingly face powerful competitive challenges in the marketplace from firms
that have rationally designed truly international systems.
Outsourcing and Offshoring
Offshoring Outsourcing
DSS - Characteristics:
Types of Decisions
There are two types of decisions - programmed and non-programmed decisions.
OLAP
Stands for "Online Analytical Processing." OLAP allows users to analyze database
information from multiple database systems at one time. While relational databases
are considered to be two-dimensional, OLAP data is multidimensional, meaning
the information can be compared in many different ways. For example, a company
might compare their computer sales in June with sales in July, and then compare
those results with the sales from another location, which might be stored in a
different database.
What is GIS?
Maps are the geographic container for the data layers and analytics you want to
work with. GIS maps are easily shared and embedded in apps, and accessible by
virtually everyone, everywhere.
Data
GIS integrates many different kinds of data layers using spatial location. Most data
has a geographic component. GIS data includes imagery, features, and basemaps
linked to spreadsheets and tables.
Analysis
Spatial analysis lets you evaluate suitability and capability, estimate and predict,
interpret and understand and much more, lending new perspectives to your insight
and decision-making.
Apps
Apps provide focused user experiences for getting work done and bringing GIS to
life for everyone. GIS apps work virtually everywhere: on your mobile phones,
tablets, in web browsers, and on desktops.
Data Visualization System
Data visualization is the graphical representation of information and data. By
using visual elements like charts, graphs, and maps, data visualization tools
provide an accessible way to see and understand trends, outliers, and patterns in
data.
1. Charts
The easiest way to show the development of one or several data sets is a chart.
Charts vary from bar and line charts that show the relationship between elements
over time to pie charts that demonstrate the components or proportions between the
elements of one whole.
2. Plots
Plots allow distributing two or more data sets over a 2D or even 3D space to show
the relationship between these sets and the parameters on the plot. Plots also vary.
Scatter and bubble plots are some of the most widely-used visualizations. When it
comes to big data, analysts often use more complex box plots that help visualize
the relationship between large volumes of data.
3. Maps
Maps are popular ways to visualize data used in different industries. They allow to
locate elements on relevant objects and areas — geographical maps, building
plans, website layouts, etc. Among the most popular map visualizations are heat
maps, dot distribution maps, cartograms.
4. Diagrams and matrices
Diagrams are usually used to demonstrate complex data relationships and links and
include various types of data on one visualization. They can be hierarchical,
multidimensional, tree-like.
Matrix is one of the advanced data visualization techniques that help determine
the correlation between multiple constantly updating (steaming) data sets.
Business Intelligence
In broad terms, business intelligence systems are used to maintain, optimize and
streamline current operations. The term refers to technologies, applications and
practices for the collection, integration, analysis and presentation of business
information. The purpose of business intelligence is to support data-driven
business decision making. Business intelligence is sometimes used interchangeably
with briefing books, report and query tools, and executive information systems.
Once data has been collected and analyzed, Business intelligence analytics systems
then use that data for predictive modeling. This can predict and, in most cases,
prepare for future business climates. One of the most powerful aspects of BA is ad-
hoc reporting, which allows companies to perform analysis of specified data in
real-time to answer targeted questions to make quicker business decisions. In
effect, business analytics uses predictive analysis to solve problems before they’ve
occurred.
With the increasingly vast amount of data available today and the constantly
evolving preferences and complexity of customers, businesses can no longer rely
on traditional business methods to drive growth. These radical changes have
opened up new realm of possibilities, with AI, to drive business growth through
actionable insights generated from customer data.
Artificial intelligence in business simply involves the use of intelligent computer
software with human-like capabilities to boost revenue, improve customer
experience, increase productivity and efficiency, and drive business growth and
transformation.
The benefits businesses stand to gain from the use of AI is endless and includes:
Automation of processes
More positive results from marketing activities and increased revenue
Better understanding of customers and improved experience of services
offered
Fraud detection
Improved and more reliable customer service
Expert System in AI: What is, Applications & Example
The Expert System in AI can resolve many issues which generally would require a
human expert. It is based on knowledge acquired from an expert. Artificial
Intelligence and Expert Systems are capable of expressing and reasoning about
some domain of knowledge. Expert systems were the predecessor of the current
day artificial intelligence, deep learning and machine learning systems.
1. User Interface
The user interface is the most crucial part of the Expert System Software. This
component takes the user's query in a readable form and passes it to the inference
engine. After that, it displays the results to the user. In other words, it's an interface
that helps the user communicate with the expert system.
2. Inference Engine
The inference engine is the brain of the expert system. Inference engine contains
rules to solve a specific problem. It refers the knowledge from the Knowledge
Base. It selects facts and rules to apply when trying to answer the user's query. It
provides reasoning about the information in the knowledge base. It also helps in
deducting the problem to find the solution. This component is also helpful for
formulating conclusions.
3. Knowledge Base
The knowledge base is a repository of facts. It stores all the knowledge about the
problem domain. It is like a large container of knowledge which is obtained from
different experts of a specific field.
Thus we can say that the success of the Expert System Software mainly depends
on the highly accurate and precise knowledge.
Applications of Expert Systems
Some popular Application of Expert System:
Information management
Hospitals and medical facilities
Help desks management
Employee performance evaluation
Loan analysis
Virus detection
Useful for repair and maintenance projects
Warehouse optimization
Planning and scheduling
The configuration of manufactured objects
Financial decision making Knowledge publishing
Process monitoring and control
Supervise the operation of the plant and controller
Stock market trading
Airline scheduling & cargo schedules
Summary
An Expert System is an interactive and reliable computer-based decision-
making system which uses both facts and heuristics to solve complex
decision-making problem
Key components of an Expert System are 1) User Interface, 2) Inference
Engine, 3) Knowledge Base
Key participants in Artificial Intelligence Expert Systems Development are
1) Domain Expert 2) Knowledge Engineer 3) End User
Improved decision quality, reduce cost, consistency, reliability, speed are
key benefits of an Expert System
An Expert system can not give creative solutions and can be costly to
maintain.
An Expert System can be used for broad applications like Stock Market,
Warehouse, HR, etc
MODULE 5
MANAGING SEACURITY AND ETHICS ISSUES IN IT:
It security, ethic and society, ethics responsibility of business professionals,
cybercrime: hacking and cracking , cyber theft, cyber terrorism, unauthorized use,
software piracy, theft of IP, computer virus , adware and spyware, privacy issues, health
issues, societal issues-cyber security and cryptography: security management tools,
cryptographic keys, encryption, firewalls-system controls and audits: information system
controls, auditing IT security-Block chain technology: how it works, features, business
applications.
SECURITY ÐICAL CHALLENGS:
Information system have made many businesses successful today. Some
companies such as Google, Facebook, EBay, etc. Would not exist without information
technology. However, improper use of information technology can create problems for
the organization and employees.
Criminals gaining access to credit card information can lead to financial loss
to the cards or financial institute. Using organization information systems I.e. posting
inappropriate content on Facebook or Twitter a company account can lead to lawsuits
and loss business.
This tutorial will address such challenges that are posed by information
systems and what can be done to minimize or eliminate the risks.
In this tutorials, you will learn-
Cyber- crime
Information system Security
Information system Ethics
Information communication technology (ICT) policy.
IT SECURITY:
It security is a set of cybersecurity strategies that prevents unauthorized access
to organizational assets such as computers, networks, and data. It maintains the
integrity and confidentiality of sensitive information, blocking the access of
sophisticated hackers.
WHAT ARE THE THREATS TO IT SECURITY?
Threats to IT security can come in different forms. A common threat is
malware, or malicious software, which may come in different variations to infect
network devices, including:
RANSOMWARE
SPYWARE
VIRUSES
These threats make it even more important to have reliable security
practices in place. Learn more about malware to stay protected.
CYBER THEFT:
Cyber theftis a part of cybercrime which means theftcarried out by means of
computers or the Internet. The most common types of cyber theft include identify theft,
password theft, theft of information, internet time thefts etc.
CYBERTERROISM:
Cyberterrorism is the use of the internet to conduct violent acts that result in, or
threaten, loss of life or significant bodily harm, in order to achieve political or ideological
gains through threat or intimidation. It is also sometimes considered an act of
deliberate, large-scale disruption of computer networks, especially of personal
computers attached to the internet by means of tools such as computer viruses,
computer worms, phishing and other malicious software and hardware methods and
programming scripts. Cyberterrorism is a controversial term. Some authors opt for a
very narrow definition, relating of development by known terrorist organizations of
disruption attacks against information systems for the primary purpose of creating
alarm, panic or physical disruption.
UNAUTHORIZED USE:
Generally, unauthorized use is the use of a credit card by a person who does
not have the right to use the card. For example, if you lose your card and someone finds
it and uses it, that would be an unauthorized use, you have authorized the use.
Unauthorized access is when someone gains access to a website, program,
service, or other system using someone else account or other methods. For example, if
someone kept guessing a password or username for an account that was not theirs until
they gained access, it is considered unauthorized access.
SOFTWARE PIRACY:
Software piracy is the act of stealing software that is legally protected. This stealing
includes copying, distributing, modifying or selling the software. Copyright laws were
originally put into place so that the people who develop software (programmers,
writers, graphic artists, etc.)
Software piracy doesnt require a hacker or skilled coder. Any normal person with a
computer can become a software pirate if they dont know about the software laws.
With such a widespread impact, its important to understand what software piracy is and
the dangers it presents.
COMPUTER VIRUS:
A computer virus is a type of computer program that, when executed, replicates
itself by modifying other computer programs and inserting its own code. If this
replication succeeds, the affected areas are then said to be infectedwith a computer
virus.
Computer virus generally require a host program. The virus writes its own code
into the host program. When the program runs, the written virus program is
executed first, causing infection and damage. A computer worm does not need a
host program, as it is an independent program, as it is an independent program or
code chunk. Therefore, it is not restricted by the host program, but can run
independently and actively carry out attacks.
Computer viruses cause billions of dollars worth of economic damage each year.
In 1989 The ADAPSO software Industry Division published dealing with Electronic
Vandalism, in which they followed the risk of data loss by the added risk of losing
customer confidence.
In response, free, open-source anti-virus tools have been developed, and an
industry of antivirus software has cropped up, selling or freely distributing virus
protection to users of various operating systems.
ADWARE &SPYWARE:
Adware is malicious software that automatically displays advertisements
online to generate revenue for its author. Advertisements may appear in the user
interface of the software, onscreen during the installation process, process, or in a
browser.
While adware is not always dangerous, in some cases it may be designed to
analyse the internet sites visited, present advertising content, install additional
programs, and redirect your browser to unsafe sites. It can even contain Trojan horses
and spyware.
Adware can be bundled with software or a game that user wants. In many
cases, during installation the bundle will access a third-part server that delivers the most
current adware or add-on without ever touching the drive. Additionally, the same
adware installers might hijack the delivery mechanism and can be utilized to deliver a
much higher-severity malware.
Spyware is malicious software code that runs secretly on a computer,
gathers information about the user and their browsing habits, and then transmits that
information back to a remote entity. Rather than disrupting a device operation, spyware
targets sensitive information and can grant remote access to hackers.
The purpose of spyware is to collect information about a person or
organization without their knowledge and transmit that information to another entity
for financial gain. That is why spyware is often used to steal financial or personal
information. One specific type of spyware is a keylogger, which records the users
keystrokes to reveal passwords and other personal information. This makes it a high
severity thread.
PRIVACY ISSUES:
Spying and snooping. When you are online, you are spied by a number of trackers for
various purposes.
Information Mishandling.
Location Tracking.
Used a VPN.
Conduct Safe Browsing.
Keep Your System Up-to-Date.
Use Anti-Virus.
Adjust Your Settings on Social Media.
HEALTH ISSUES:
Physical Activity and Nutrition
Overweight and Obesity
Tobacco
Substance Abuse
HIV/AIDS
Mental Health
Injury and Violence
Environmental Quality
Immunization
Access to Health
SOCIAL ISSUE:
ASocial issue is a problem that influences many citizens within a society. It is
a group of common problems in present-day society and one that many people strive to
solve. It is often the consequence of factors extending beyond an individual control.
Social issues are the source of a conflicting opinion on the grounds of what is perceived
as morally correct or incorrect personal life or interpersonal social life decisions. Social
issues are distinguished from economic issues; however, some issues (such as
immigration) have both social and economic aspects. There are also issues that do not
fall into either category, such as warfare.
· Operational security includes the processes and decisions for handling and
protecting data assets. The permissions users have when accessing a network
and the procedures that determine how and where data may be stored or shared
all fall under this umbrella.
· Disaster recovery and business continuity define how an organization
responds to a cyber-security incident or any other event that causes the loss of
operations or data. Disaster recovery policies dictate how the organization
restores its operations and information to return to the same operating capacity
as before the event. Business continuity is the plan the organization falls back on
while trying to operate without certain resources.
What is Cryptography?
To ensure that the company’s online resources are safe and sound, there are
many online tools that security managers can and should use. You can find a list
of some of them below.
1. MailCleaner
This anti-spam software package provides a number of benefits for the online
security of organizations. It is installed between the mail infrastructure and the
Internet, and it uses a powerful spam filter to stop malware before it reaches the
inbox of corporate users.The viruses are also detected by using the latest online
technologies to provide maximum security for various users, from small sole
traders to large enterprises. User friendliness of the design, as well as easy
installation and control, make MailCleaner a good option for security managers
because it optimizes security efforts and uses effective contemporary
technologies.
2. Adguard
This is one of the best ad blockers in the game. It helps to get rid of annoying
ads, online tracking and protect the computer from malware. It works in all
browsers and has great advanced functions, such as HTML code filtering,
cosmetic processing of the page, ad filtering in applications, protection from
malicious ads, and even 24×7 support. In addition to blocking all types of ads, the
tool is useful in protecting personal data by blocking access to online trackers
that spy on the Internet all the time.
3. AVDS
This next tool is developed by a reputable company Beyond Security and is
capable of improving a corporate network security. It can be used in networks
from 50 to 200,000 nodes and provides a comprehensive examination of security
weaknesses. AVDS is a great alternative to resource- and time-consuming
manual vulnerability assessment, an approach which is largely ineffective and
cannot provide the maximum level of security. In addition to discovering security
vulnerabilities, the tool automatically generates specific recommendations on
how to improve the security of the network
4. Cloudflare
Cloudflare provides a software package that enhances performance and security
of online resources. For example, it can dramatically improve website
performance and security by using web optimization features and DDoS, WAF
and SSL protection tools. Thanks to an incredibly large network and
infrastructure, Cloudflare can stop serious malware attacks on DNS systems.
The security officers can receive support from the online team to ensure that
every page is working properly and that all data is secured.
5. SiteLock
Another great tool for security managers who need to optimize their work. It
provides website scanning, malware removal, source code analysis, vulnerability
management, DDoS protection, blocking of harmful requests, PCI compliance,
and website speed improvement. This package provides comprehensive security
for corporate and individual websites and greatly improves the quality of security
management with effective solutions
7. Pure VPN
Pure VPN is a state-of-the-art technology for encrypting Internet traffic,
anonymizing Internet activity, and enhancing online security. It works on all
operating systems, uses over 500 servers in 121 countries, and promises the
fastest speed possible and greater chances of avoiding hackers.
Cryptographic keys
Encryption
Data can be encrypted "at rest," when it is stored, or "in transit," while it is being
transmitted somewhere else.
The two main kinds of encryption are symmetric encryption and asymmetric
encryption. Asymmetric encryption is also known as public key encryption.
In symmetric encryption, there is only one key, and all communicating parties use
the same (secret) key for both encryption and decryption. In asymmetric, or
public key, encryption, there are two keys: one key is used for encryption, and a
different key is used for decryption. The decryption key is kept private (hence the
"private key" name), while the encryption key is shared publicly, for anyone to
use (hence the "public key" name). Asymmetric encryption is a foundational
technology for TLS (often called SSL).
Fire wall
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established
security policies. At its most basic, a firewall is essentially the barrier that sits
between a private internal network and the public Internet. A firewall’s main
purpose is to allow non-threatening traffic in and to keep dangerous traffic out.
Email monitoring
Virus defensor
The most common virus defense is the so-called 'scanner', which examines
computer. files to detect known viruses. Scanners have several important
problems that have a serious. impact on their current and future viability as a
defense, most notably:they only detect viruses known to the author.
System Audit
It is an investigation to review the performance of an operational system. The objectives
of conducting a system audit are as follows −
● To verify that the stated objectives of system are still valid in current
environment.
Audit Trial
An audit trial or audit log is a security record which is comprised of who has
accessed a computer system and what operations are performed during a given
period of time. Audit trials are used to do detailed tracing of how data on the
system has changed.
Audit Considerations
Audit considerations examine the results of the analysis by using both the
narratives and models to identify the problems caused due to misplaced
functions, split processes or functions, broken data flows, missing data,
redundant or incomplete processing, and nonaddressed automation
opportunities.
Control Measures
There are variety of control measures which can be broadly classified as follows −
1. Backup
● Regular backup of databases daily/weekly depending on the time criticality
and size.
IT audits are also known as automated data processing audits (ADP audits) and
computer audits.
They were formerly called electronic data processing audits (EDP audits).
Blockchain technology
Every transaction in this ledger is authorized by the digital signature of the owner,
which authenticates the transaction and safeguards it from tampering. Hence, the
information the digital ledger contains is highly secure.
In simpler words, the digital ledger is like a Google spreadsheet shared among
numerous computers in a network, in which, the transactional records are stored
based on actual purchases. The fascinating angle is that anybody can see the
data, but they can’t corrupt it.
1. Hash Encryptions
Blockchain technology uses hash encryption to secure the data, relying mainly
on the SHA256 algorithm to secure the information. The address of the sender
(public key), the receiver’s address, the transaction, and his/her private key
details are transmitted via the SHA256 algorithm. The encrypted information,
called hash encryption, is transmitted across the world and added to the
Blockchain after verification. The SHA256 algorithm makes it almost impossible
to hack the hash encryption, which in turn simplifies the sender and receiver’s
authentication.
2. Proof of Work
In a Blockchain, each block consists of 4 main headers.
● Previous Hash: This hash address locates the previous block.
● Transaction Details: Details of all the transactions that need to occur.
● Nonce: An arbitrary number given in cryptography to differentiate the
block’s hash address.
● Hash Address of the Block: All of the above (i.e., preceding hash,
transaction details, and nonce) are transmitted through a hashing
algorithm. This gives an output containing a 256-bit, 64 character length
value, which is called the unique ‘hash address.’ Consequently, it is
referred to as the hash of the block.
Numerous people around the world try to figure out the right hash value to meet
a pre-determined condition using computational algorithms. The transaction
completes when the predetermined condition is met. To put it more plainly,
Blockchain miners attempt to solve a mathematical puzzle, which is referred to
as a proof of work problem. Whoever solves it first gets a reward.
Blockchain Consists of four main headers
3. Mining
In Blockchain technology, the process of adding transactional details to the
present digital/public ledger is called ‘mining.’ Though the term is associated with
Bitcoin, it is used to refer to other Blockchain technologies as well. Mining
involves generating the hash of a block transaction, which is tough to forge,
thereby ensuring the safety of the entire Blockchain without needing a central
system
1. Payments
We all know that blockchains began from cryptocurrency and it is obvious that
they work perfectly with payments and money transfers. But why is the use of
blockchain so beneficial for small businesses? Fees. It's all about fees that banks
charge when you need to pay for something or transfer money to somebody.
With the blockchain technology, you don't need to pay to the banks which
dramatically cuts your expenses. In the transfer chain, there are no more
intermediaries, only you and a person you send your money to. If your business
is located in several countries or you have a remote team of employees,
Blockchain based business model implementation is a necessary step
2. Smart contracts
This terms appeared about 25 years ago, however, only after the project
Ethereum was launched, the smart contracts system became widely publicized.
To put it shortly, it is a distributed system that manages all smart contracts. The
platform excludes the possibility of delays, suppression or any outside influence.
The system provides comprehensive financial security, monitors the terms of the
contract and is unbreakable. If in your business you deal with lots of contracts
(especially, if you need to sign a contract with every client), Smart contracts are
the best solution for you. What can we say if the biggest and the most powerful
banks in the world take this system into account?
4. Digital Identity
If you still don't understand why this issue is so urgent, then you need to see the
fraud statistics of all internet operations. To tell you the truth, the size of your
company doesn't matter here because fraud happens just as much in big
companies as it does in the small ones.
With the help of blockchain technology, it is much easier to track and monitor
digital identities. And the best thing it does is identity authentication, where
blockchains are needed to secure the whole procedure. While the usual
authentication methods use the system based on passwords, the blockchain
system only checks whether there was a correct private key.
5. Notary
You may not believe this fact but blockchain can work as a cheap notary system.
Blockchains are able to provide evidence of existence, ownership and validate
the identity of sets of data. What blockchain can also do is generate prior art or
certify the ownership of any type of data. Believe me, it is a very cheap method,
unlike the usual one which will cough up the cash for you. For instance, to certify
a document in Europe, you'll have to pay more than 200 euros. With the
blockchain platform, you'll spend 0.2 euros. And if you deal with such certificates,
this blockchain business idea will help you stay afloat.
These steps are inevitable if your business is connected with the e-commerce
sphere. Various loyalty programs help you engage customers and show them
your care. And, again, blockchains can help us avoid different types of scams
and create unique certificates which would be easy to verify.
7. IoT systems
IoT devices collect megatonnes of data to learn how you behave, what you like,
how you live and so on. All this information needs to be processed and stored.
And blockchains fit these criteria the best. We can explain it with two facts.
Firstly, blockchain can communicate with all your devices simultaneously. And
secondly, it saves lots of money because it eliminates the central hub and acts
as a bridge between all IoT devices.
8. Chain of supply
Blockchain is a real must-have for your business if you work with deliveries of
any kind. Usual software that manages supply chains is very fragile and in a case
of a crash, you have all chances to go bankrupt. The structure of blockchains is
designed to eliminate the human factor and flaws in the system. Blockchains
records everything that happens which means that even in case of a failure or
crack you can always find out what happened and rehabilitate the system.
These blockchain-based applications show how useful the blockchains could be
for your business no matter how big your company is. We advise you to apply
blockchain not only because it is a very advanced technology but also because
the system has a very bright future. Let's take a look at what financial future the
blockchains have.